Your IoT’s not sick – Someone just turned it into a brick! A 14-year-old hacker created a new strain of malware called “Silex malware” which bricked over 4000 IoT devices in the span of a few hours. Once again, the world is shocked to find that IoT devices are vulnerable to all kinds of attacks.…

MWC went by so fast that you may have missed some of the highlights. Luckily, we’ve compiled the following takeaways from the Barcelona conference. With apologies to Don Adams, it really is time to Get Smart! From Smart Cities and Smart Homes, to Smart Mobility and Smart Wellness, you might think that we’ve moved out…

New Research Shows Why We Should Trust CSPs With Our Data Security New research, published this week, shows that the most effective way of protecting consumers from online security threats is to apply network-based security solutions, because CSPs are best placed to deliver security to the mass market. Furthermore, CSPs can gain significant revenue…

Don’t let cybercriminals score. Beat their game-plan. Cybercriminals typically take advantage of the huge public interest in major international events. The FIFA World Cup 2018 that begins shortly in Russia is no exception and cybercriminals have been busy exploiting the excitement about the world’s biggest sporting event. The numbers are staggering. FIFA estimated that 715.1…

Danger: VPNFilter Malware: What is it and how is network-based security best placed to thwart it? What’s this latest threat? A new malware threat has emerged that poses such a serious potential threat to data security that the FBI has advised all router users to reboot their devices. The malware, called VPNFilter, can spy…

Data Privacy: Five Ways to Ensure You Comply with GDPR Because, the times, they are a’ changin’ for data management Companies and organizations across the world better get ready. Fast. Because the EU’s new General Data Protection Regulation (GDPR) comes into force on 25th May, and it’s a game-changer for the way they collect,…

Cryptocurrency Hijacking Cryptocurrency hijacking, or “cryptojacking” is one of the major threats faced by Enterprise IT teams today, and probably the most underestimated. Cryptojacking involves the covert, illegal use of targeted computing resources to mine cryptocurrencies. Cryptocurrency mining requires massive processing power to solve complex algorithms as part of the blockchain validation mechanism. This…

Five years ago, a “hacktivist” group of cyber-disruptors united to attack the Internet infrastructure and websites of the State of Israel. The initial date of that attack was the 7th of April 2013, the eve of Israel’s annual Holocaust Memorial Day, and they have continued to target Israel every year on the anniversary of…

True story. All I wanted was to upgrade our home thermostat to a smart one. What did I end up with? A lecture about IoT security. Who gave me the lecture? You won’t guess—my wife! Smart and educated, my wife is well-versed in what’s going on in the world through reading newspapers and watching…

Another Mobile World Congress (MWC) has come and gone. An impressive event as always, this year over 100,000 people descended on an unusually chilly Barcelona for the world’s largest exhibition for the ever-expanding mobile industry to learn about the latest trends and technologies – and to showcase the latest innovations. If one word were to…